Focus on Microsoft
SecurityFocus Microsoft Newsletter #406 Aug 07 2008 03:48PM
Rob Keith (rkeith securityfocus com)
SecurityFocus Microsoft Newsletter #406
----------------------------------------

This issue is sponsored by Sponsored by IBM® Rational® AppScan
Copy: Failure to properly secure Web applications significantly impacts
your ability to protect sensitive client and corporate data. IBM
Rational AppScan is an automated scanner that monitors, identifies and
helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against
the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r

SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as
conveying topics of interest for our community. We are proud to offer
content from Matasano at this time and will be adding more in the coming
weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.An Astonishing Collaboration
2.Bad-Code Blues
II. MICROSOFT VULNERABILITY SUMMARY
1. WebEx Meeting Manager 'atucfobj.dll' ActiveX Control Remote
Buffer Overflow Vulnerability
2. JBoss Enterprise Application Platform Information Disclosure
Vulnerability
3. Winamp 'NowPlaying' Unspecified Security Vulnerability
4. Ingres Database Multiple Local Vulnerabilities
5. MailEnable 3.52 IMAP Remote Denial of Service Vulnerability
6. Apple Mac OS X QuickLook Multiple Memory Corruption
Vulnerabilities
7. Sun xVM VirtualBox 'VBoxDrv.sys' Local Privilege Escalation
Vulnerability
8. F-PROT Antivirus Archive Parsing Denial of Service Vulnerability
9. Citrix Presentation Server 'icabar.exe' Local Privilege
Escalation Vulnerability
10. BlazeVideo HDTV Player PLF File Stack Buffer Overflow
Vulnerability
11. AVG Anti-Virus UPX File Parsing Denial of Service Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #405
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.An Astonishing Collaboration
By Dan Kaminsky
Wow. It's out. It's finally, finally out. Sweet!
http://www.securityfocus.com/columnists/477

2.Bad-Code Blues
By Don Parker
The current state of secure software development by corporations both
large and small is a mess. We are still cursed with half-baked software,
and as a result, a never ending stream of vulnerabilities. Secure coding
practices and active quality assurance (QA) efforts are now more
mainstream, but that still hasn.t made much of a dent.
http://www.securityfocus.com/columnists/476

II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. WebEx Meeting Manager 'atucfobj.dll' ActiveX Control Remote Buffer
Overflow Vulnerability
BugTraq ID: 30578
Remote: Yes
Date Published: 2008-08-06
Relevant URL: http://www.securityfocus.com/bid/30578
Summary:
WebEx Meeting Manager is prone to a stack-based buffer-overflow
vulnerability because it fails to perform adequate boundary checks on
user-supplied input. This issue affects the 'atucfobj.dll' ActiveX
control library.

An attacker can exploit this issue to execute arbitrary code in the
context of an application using the affected ActiveX control (typically
Internet Explorer). Failed attacks will likely cause denial-of-service
conditions.

'atucfobj.dll' 20.2008.2601.4928 is vulnerable; other versions may also
be affected.

2. JBoss Enterprise Application Platform Information Disclosure
Vulnerability
BugTraq ID: 30540
Remote: Yes
Date Published: 2008-08-05
Relevant URL: http://www.securityfocus.com/bid/30540
Summary:
JBoss Enterprise Application Platform is prone to a remote
information-disclosure vulnerability.

Remote attackers can exploit this issue to obtain potentially sensitive
details about deployed web contexts. Information obtained may lead to
further attacks.

The issue affects versions prior to JBoss Enterprise Application
Platform 4.3.0.CP01 and 4.2.0.CP03.

3. Winamp 'NowPlaying' Unspecified Security Vulnerability
BugTraq ID: 30539
Remote: Yes
Date Published: 2008-08-04
Relevant URL: http://www.securityfocus.com/bid/30539
Summary:
Winamp is prone an unspecified vulnerability.

Very few details are available regarding this issue. We will update this
BID as more information emerges.

This issue affects versions prior to Winamp 5.541.

4. Ingres Database Multiple Local Vulnerabilities
BugTraq ID: 30512
Remote: No
Date Published: 2008-08-01
Relevant URL: http://www.securityfocus.com/bid/30512
Summary:
Ingres Database is prone to multiple local vulnerabilities:

- Multiple local privilege-escalation vulnerabilities
- A vulnerability that may allow attackers to overwrite arbitrary files.

Local attackers can exploit these issues to gain elevated privileges on
the affected computer, execute arbitrary code with superuser privileges,
and overwrite arbitrary files owned by 'Ingres' user.

5. MailEnable 3.52 IMAP Remote Denial of Service Vulnerability
BugTraq ID: 30498
Remote: Yes
Date Published: 2008-08-01
Relevant URL: http://www.securityfocus.com/bid/30498
Summary:
MailEnable is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to crash the affected application,
denying service to legitimate users.

MailEnable 3.62 Professional Edition and Enterprise Edition are
vulnerable; other versions may also be affected.

6. Apple Mac OS X QuickLook Multiple Memory Corruption Vulnerabilities
BugTraq ID: 30493
Remote: Yes
Date Published: 2008-07-31
Relevant URL: http://www.securityfocus.com/bid/30493
Summary:
Apple Mac OS X is prone to multiple memory-corruption vulnerabilities
that affect the QuickLook component.

Attackers can exploit these issues to execute arbitrary code in the
context of the affected application or cause denial-of-service conditions.

The following versions are affected:

Mac OS X v10.5.4 and prior
Mac OS X Server v10.5.4 and prior

This issue does not affect systems prior to Mac OS X v10.5.

NOTE: These issues were previously covered in BID 30483 (Apple Mac OS X
2008-005 Multiple Security Vulnerabilities) but have been given their
own record to better document these vulnerabilities.

7. Sun xVM VirtualBox 'VBoxDrv.sys' Local Privilege Escalation Vulnerability
BugTraq ID: 30481
Remote: No
Date Published: 2008-08-04
Relevant URL: http://www.securityfocus.com/bid/30481
Summary:
Sun xVM VirtualBox is prone to a local privilege-escalation
vulnerability that occurs in the 'VBoxDrv.sys' driver.

An attacker can exploit this issue to execute arbitrary code with
kernel-level privileges on a Microsoft Windows host operating system.
Successfully exploiting this issue will result in the complete
compromise of affected computers. Failed exploit attempts will result in
a denial-of-service condition.

Sun xVM VirtualBox 1.6.0 and 1.6.2 running on Windows are vulnerable;
other versions may also be affected.

8. F-PROT Antivirus Archive Parsing Denial of Service Vulnerability
BugTraq ID: 30461
Remote: Yes
Date Published: 2008-07-31
Relevant URL: http://www.securityfocus.com/bid/30461
Summary:
F-PROT Antivirus is prone to a denial-of-service vulnerability.

F-PROT Antivirus 6.2.1.4252 is vulnerable; other versions may also be
affected.

9. Citrix Presentation Server 'icabar.exe' Local Privilege Escalation
Vulnerability
BugTraq ID: 30446
Remote: No
Date Published: 2008-07-30
Relevant URL: http://www.securityfocus.com/bid/30446
Summary:
Citrix Presentation Server (formerly Citrix MetaFrame Server) is prone
to a privilege-escalation vulnerability caused by a flaw in how
'icabar.exe' is invoked via a 'Run' registry key.

Attackers can leverage this issue to execute arbitrary code with
administrator privileges. Successful exploits will completely compromise
affected computers.

The following products are vulnerable when running on Windows NT,
Windows 2000, and Windows 2003:

Citrix MetaFrame Presentation Server 3.0 and prior
Citrix MetaFrame XP 1.0 and prior

10. BlazeVideo HDTV Player PLF File Stack Buffer Overflow Vulnerability
BugTraq ID: 30442
Remote: Yes
Date Published: 2008-07-30
Relevant URL: http://www.securityfocus.com/bid/30442
Summary:
BlazeVideo HDTV Player is prone to a stack-based buffer-overflow
vulnerability because the application fails to handle malformed playlist
files.

An attacker can exploit this issue to execute arbitrary code within the
context of the application or to trigger a denial-of-service condition.

BlazeVideo HDTV Player 3.5 is vulnerable; other versions may also be
affected.

11. AVG Anti-Virus UPX File Parsing Denial of Service Vulnerability
BugTraq ID: 30417
Remote: Yes
Date Published: 2008-07-28
Relevant URL: http://www.securityfocus.com/bid/30417
Summary:
AVG Anti-Virus is prone to a denial-of-service vulnerability.

Exploiting this issue may allow attackers to crash AVG Anti-Virus and
deny service to legitimate users of the application.

Versions prior to AVG Anti-Virus 8.0.156 are vulnerable.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #405
http://www.securityfocus.com/archive/88/495002

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
ms-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the subscribed address.
The contents of the subject or message body do not matter. You will
receive a confirmation request message to which you will have to answer.
Alternatively you can also visit
http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and
ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Sponsored by IBM® Rational® AppScan
Copy: Failure to properly secure Web applications significantly impacts
your ability to protect sensitive client and corporate data. IBM
Rational AppScan is an automated scanner that monitors, identifies and
helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against
the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus